Sciweavers

2038 search results - page 138 / 408
» Loops under Strategies
Sort
View
169
Voted
JAIR
2011
214views more  JAIR 2011»
14 years 7 months ago
Stackelberg vs. Nash in Security Games: An Extended Investigation of Interchangeability, Equivalence, and Uniqueness
There has been significant recent interest in game theoretic approaches to security, with much of the recent research focused on utilizing the leader-follower Stackelberg game mo...
Dmytro Korzhyk, Zhengyu Yin, Christopher Kiekintve...
DAC
2003
ACM
16 years 5 months ago
Behavioral consistency of C and verilog programs using bounded model checking
We present an algorithm that checks behavioral consistency between an ANSI-C program and a circuit given in Verilog using Bounded Model Checking. Both the circuit and the program ...
Edmund M. Clarke, Daniel Kroening, Karen Yorav
126
Voted
ASAP
1997
IEEE
107views Hardware» more  ASAP 1997»
15 years 7 months ago
Tiling with limited resources
In the framework of perfect loop nests with uniform dependences, tiling has been extensively studied as a source-to-source program transformation. Little work has been devoted to ...
Pierre-Yves Calland, Jack Dongarra, Yves Robert
DAC
2001
ACM
16 years 5 months ago
Dynamic Detection and Removal of Inactive Clauses in SAT with Application in Image Computation
In this paper, we present a new technique for the e cient dynamic detection and removal of inactive clauses, i.e. clauses that do not a ect the solutions of interest of a Boolean ...
Aarti Gupta, Anubhav Gupta, Zijiang Yang, Pranav A...
ISBI
2004
IEEE
16 years 4 months ago
Software Process: The Key to Developing Robust, Reusable and Maintainable Open-Source Software
The practice of image processing inherently requires software development. Creating this technology requires designing, implementing, debugging and testing software applications o...
Ken Martin, Luis Ibáñez, William J. ...